<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic New To Palo Alto Firewalls in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/new-to-palo-alto-firewalls/m-p/146294#M49170</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have Frontier FIOS and am currently using an ASA for my Internet router but want to use a PA-200 with a Cisco 891F behind it.&amp;nbsp; The design looks like this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ISP(DHCP)----(e1/1)-PA-200-(e1/2)---891F (5 subnets)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I set e1/1 untrust w/DHCP from the ISP and e1/2 trust w/static /30 to 891F.&amp;nbsp; I also checked auto create default route to inject route from the ISP and setup Outbound NAT to any/any with no other security policies in place.&amp;nbsp; I allowed ping on both interfaces for troubleshooting.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I prefer not to use the PA-200 for DHCP, therefore, on the 891, I have multiple VLANs with DHCP processes doling out IP addresses/SM/GW/DNS.&amp;nbsp; That works fine and all routing seems to be working, as well.&amp;nbsp; Added a default route to exit the 891s interface connected to the PA-200.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The PA-200 did acquire a DHCP address from the ISP.&amp;nbsp; The trouble I'm having is that I cannot access the Internet from any deivce nor ping the untrusted interface ip.&amp;nbsp; I am not using the ISPs router at all.&amp;nbsp; I guess I am not sure if this is the best design to get this going so, if not, can someone point me in the right direction?&amp;nbsp; I hope this makes sense.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Dan&lt;/P&gt;</description>
    <pubDate>Tue, 07 Mar 2017 01:53:19 GMT</pubDate>
    <dc:creator>DRobinson_TIC</dc:creator>
    <dc:date>2017-03-07T01:53:19Z</dc:date>
    <item>
      <title>New To Palo Alto Firewalls</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-to-palo-alto-firewalls/m-p/146294#M49170</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have Frontier FIOS and am currently using an ASA for my Internet router but want to use a PA-200 with a Cisco 891F behind it.&amp;nbsp; The design looks like this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ISP(DHCP)----(e1/1)-PA-200-(e1/2)---891F (5 subnets)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I set e1/1 untrust w/DHCP from the ISP and e1/2 trust w/static /30 to 891F.&amp;nbsp; I also checked auto create default route to inject route from the ISP and setup Outbound NAT to any/any with no other security policies in place.&amp;nbsp; I allowed ping on both interfaces for troubleshooting.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I prefer not to use the PA-200 for DHCP, therefore, on the 891, I have multiple VLANs with DHCP processes doling out IP addresses/SM/GW/DNS.&amp;nbsp; That works fine and all routing seems to be working, as well.&amp;nbsp; Added a default route to exit the 891s interface connected to the PA-200.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The PA-200 did acquire a DHCP address from the ISP.&amp;nbsp; The trouble I'm having is that I cannot access the Internet from any deivce nor ping the untrusted interface ip.&amp;nbsp; I am not using the ISPs router at all.&amp;nbsp; I guess I am not sure if this is the best design to get this going so, if not, can someone point me in the right direction?&amp;nbsp; I hope this makes sense.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Dan&lt;/P&gt;</description>
      <pubDate>Tue, 07 Mar 2017 01:53:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-to-palo-alto-firewalls/m-p/146294#M49170</guid>
      <dc:creator>DRobinson_TIC</dc:creator>
      <dc:date>2017-03-07T01:53:19Z</dc:date>
    </item>
    <item>
      <title>Re: New To Palo Alto Firewalls</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-to-palo-alto-firewalls/m-p/146335#M49172</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/57579"&gt;@DRobinson_TIC&lt;/a&gt;&amp;nbsp;and welcome!&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many things could be really :0 What do you see in the monitoring tab on the&amp;nbsp;PA-200 when the client is attempting&amp;nbsp;to access the internet? How&amp;nbsp;do you have your security policy configured? Post&amp;nbsp;the screenshot pls. Who provides the DNS for the clients, is it working (l guest it is ISP so security policy on PA should allow this).&lt;/P&gt;</description>
      <pubDate>Tue, 07 Mar 2017 08:56:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-to-palo-alto-firewalls/m-p/146335#M49172</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-03-07T08:56:43Z</dc:date>
    </item>
    <item>
      <title>Re: New To Palo Alto Firewalls</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-to-palo-alto-firewalls/m-p/146340#M49174</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/57579"&gt;@DRobinson_TIC&lt;/a&gt; and welcome !&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-There's a video that might help you:&amp;nbsp;&lt;A title="Tutorial: Firewall as a PPPoE or DHCP client " href="https://youtu.be/f79fRY9nyJc" target="_blank"&gt;Tutorial: Firewall as a PPPoE or DHCP client &lt;/A&gt; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-if you say NAT set to 'any any' are you using any zone to any zone? (or IP addresses)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; I would strongly recommend setting trust to untrust with source nat bound to your external interface&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-did you add routes to the Virtual router to account for the subnets behind the cisco ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-the external interface will not be pingable until you add a management profile. for an external interface this is preferable&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;it makes you stealthy and minimizes attacks against your external interface&lt;/LI&gt;
&lt;LI&gt;it can get messy to make that work because you will need a nat rule specificlly to be able to ping your external interface, the default rule creates a LAND&amp;nbsp; attack because the source will be identical to the destination&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 07 Mar 2017 08:27:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-to-palo-alto-firewalls/m-p/146340#M49174</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-03-07T08:27:39Z</dc:date>
    </item>
    <item>
      <title>Re: New To Palo Alto Firewalls</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-to-palo-alto-firewalls/m-p/146382#M49180</link>
      <description>&lt;P&gt;Just reading over what you are describing I would venture to guess that you need to to two things that reaper suggusted already to make this work.&lt;/P&gt;&lt;P&gt;1) Have you taken into account the routing table on the Virtual Router? If the Palo Alto doesn't know about the subnet you're going to need to tell it where to send the traffic. For example, since I have everything routing to a pair of cores I would need to put the subnets that I'm using, set the interface, and then I give it a next hop value of the core. I imagine that you have to setup something similar.&lt;/P&gt;&lt;P&gt;2) The Management profile needs to be created, not a major deal and there are plenty of articles on how to do it, but by default you would never be able to ping an interface right out of the box.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Mar 2017 13:48:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-to-palo-alto-firewalls/m-p/146382#M49180</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-03-07T13:48:32Z</dc:date>
    </item>
    <item>
      <title>Re: New To Palo Alto Firewalls</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-to-palo-alto-firewalls/m-p/146535#M49223</link>
      <description>&lt;P&gt;Thank you all for you input.&amp;nbsp; I will look over your responses later today and provide more info as well.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Mar 2017 21:39:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-to-palo-alto-firewalls/m-p/146535#M49223</guid>
      <dc:creator>DRobinson_TIC</dc:creator>
      <dc:date>2017-03-07T21:39:18Z</dc:date>
    </item>
    <item>
      <title>Re: New To Palo Alto Firewalls</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-to-palo-alto-firewalls/m-p/147181#M49328</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;Sorry for the delay on responding but I can really properly test until tomorrow morning as my daughter needs the Internet available for online school.&amp;nbsp; I will keep you posted and follow up tomorrow.&lt;/P&gt;&lt;P&gt;Thanks for your patience,&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;</description>
      <pubDate>Sat, 11 Mar 2017 01:23:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-to-palo-alto-firewalls/m-p/147181#M49328</guid>
      <dc:creator>DRobinson_TIC</dc:creator>
      <dc:date>2017-03-11T01:23:17Z</dc:date>
    </item>
    <item>
      <title>Re: New To Palo Alto Firewalls</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-to-palo-alto-firewalls/m-p/147228#M49347</link>
      <description>&lt;P&gt;So, I finally had some time to check into this and it may have been the routing table issue on the PA-200.&amp;nbsp; So to simplify things, I enabled RIP (LOL, I know) but for the time being it is now working and all my wired/wireless clients are able to get out to the Internet.&amp;nbsp; So now, I just have to migrate my policies from the ASA to the PA-200.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again for all of your input.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Mar 2017 19:26:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-to-palo-alto-firewalls/m-p/147228#M49347</guid>
      <dc:creator>DRobinson_TIC</dc:creator>
      <dc:date>2017-03-11T19:26:30Z</dc:date>
    </item>
  </channel>
</rss>

